CVE-2026-4176
Advisory lineage Upstream: 0 Downstream: 1
Downstream
Awaiting Analysis
Published: 29 Mar 2026, 20:50
Last modified:30 Mar 2026, 15:35
Vulnerability Summary
Overall Risk (default)
high
70/100 CVSS Score
9.8 CRITICAL
v3.1 (cve.org)
EPSS Score
<0.01% LOW
0% probability
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
29 Mar 2026, 20:50
Published
Vulnerability first disclosed
30 Mar 2026, 15:35
Last Modified
Vulnerability information updated
Description
Perl versions from 5.9.4 before 5.40.4-RC1, from 5.41.0 before 5.42.2-RC1, from 5.43.0 before 5.43.9 contain a vulnerable version of Compress::Raw::Zlib. Compress::Raw::Zlib is included in the Perl package as a dual-life core module, and is vulnerable to CVE-2026-3381 due to a vendored version of zlib which has several vulnerabilities, including CVE-2026-27171. The bundled Compress::Raw::Zlib was updated to version 2.221 in Perl blead commit c75ae9cc164205e1b6d6dbd57bd2c65c8593fe94.
CVSS Metrics
- v3.1•CRITICAL•Score: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Trends
Current EPSS score: 0.01%• Percentile: 1%
Techniques & Countermeasures
- CWE-1395•Dependency on Vulnerable Third-Party Component
The product has a dependency on a third-party component that contains one or more known vulnerabilities.
Affected Systems
- shay•perl
≥ 5.9.4, < 5.40.4-RC1 | ≥ 5.41.0, < 5.42.2-RC1 | ≥ 5.43.0, < 5.43.9
References (7)
- https://www.cve.org/CVERecord?id=CVE-2026-3381
- https://lists.security.metacpan.org/cve-announce/msg/37638919/
- https://github.com/Perl/perl5/commit/c75ae9cc164205e1b6d6dbd57bd2c65c8593fe94
- https://metacpan.org/release/PMQS/Compress-Raw-Zlib-2.221/source/Changes
- https://metacpan.org/release/SHAY/perl-5.40.4/changes
- https://metacpan.org/release/SHAY/perl-5.42.2/changes
- http://www.openwall.com/lists/oss-security/2026/03/30/2